# [minion-cvs] last minute patches to build a pdf correctly

Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/home/arma/work/minion/doc

Modified Files:
minion-design.tex
SWAP.pdf
Log Message:
last minute patches to build a pdf correctly

--- NEW FILE: SWAP.pdf ---
(This appears to be a binary file; contents omitted.)

Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -d -r1.50 -r1.51
--- minion-design.tex	8 May 2002 06:24:59 -0000	1.50
+++ minion-design.tex	8 May 2002 06:39:32 -0000	1.51
@@ -474,7 +474,7 @@

\begin{figure}
\begin{center}
-\resizebox{10cm}{!}{\includegraphics{SWAP.eps}}
+\resizebox{10cm}{!}{\includegraphics{SWAP}}
\caption{The operations required by the swap'' method}
\end{center}
\end{figure}
@@ -876,8 +876,8 @@
of opportunity for this attack.

A more complete solution to partitioning attacks may be possible by
-using the batch synchronous'' approach described in
-Section \ref{subsec:batching}; this will be a subject of our research.
+using the synchronous batch'' approach described in
+Section \ref{subsec:batching}; this is a subject for future research.

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

@@ -1096,8 +1096,8 @@
% Should really summarise them, but I don't have time :-(
We would like to explore a
%One possible approach that we want to explore using Mixminion is a
-strategy called {\em synchronous batching}. This approach prevents these
-attacks even when free routes are used, and improves the
+strategy called {\em synchronous batching}. This approach seems to prevent
+these attacks even when free routes are used, and seems to improve the

The network has a fixed {\em batch period}, $t_\mathrm{batch}$, which is closely
@@ -1172,7 +1172,7 @@
enabling users to choose nodes that they trust; and interactions with
the reputation system.

-Further analysis of is needed before we can choose a
+Further analysis is needed before we can choose a
final network structure. Note that a planned structure, where each
user's software follows the plan consistently when constructing
routes, will generally be able to achieve stronger and more easily